Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

2/8/2013

Naming Your Systems

Filed under: Fun,Fun Work,Geek Work,Novell,The Network Geek at Home — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:15 am for you boring, normal people.
The moon is Waning Gibbous

Naming kids is easy, but naming systems is hard!

And, no, I don’t mean giving your phone a pet name.

I have gone on at length in the past about the importance of naming systems.  It’s a big, big deal, especially if you ever have to go back and change any of those names!  Granted, it’s not as bad now as it was in the old days when you had to manually update dozens, or sometimes hundreds, of host files or configuration files, but, still, it’s a pretty big deal.  So, naming systems are often a topic of discussion, especially among hardcore network geeks.  I’ve been in more than one meeting about choosing a naming scheme that devolved into name calling.
So, there are many schools of thought on this.  One group of people think that the name should be meaningful, giving location and function information.  That’s a good idea, but it often results in names like HOUNOVFILESERV001.  (And, yes, that’s actually a name I used on a server once, for a company that no longer exists.  It stands for HOUston NOVell FILESERVer number 001.)  Sure, it tells you what you need to know, but they quickly become unwieldy to type and maintain.
Another group would say to name your servers, or routers, or what have you, after any group of things that will be easy to remember, like the names of the Seven Dwarves, or characters from the Dilbert cartoon, or, even, at one place I worked, the names of the old Space Shuttle fleet.  And, while I’m not a huge fan of that for many things at a business, it can be fun to ping a Cisco router named Elvis just to get the response “Elvis is alive”.  Certainly at home, I tend to favor a more fun approach using something light-hearted, like the names of cartoon characters or mythological beings or something similar.  But, my problem is always, which set of “things” to choose?

Well, the Naming Schemes Wiki solves that particular problem.  Yes, someone has started a wiki that gathers all the different naming schemes you all can think of in one place for your viewing pleasure.  And, in spite of any protests from your significant other, you can select, at your leisure, a naming scheme to use on your network that makes you smile.  (And, stop looking at me that way!  I know I’m not the only person in the world with a home network big enough or complicated enough to warrant having to choose a naming system for it!)  The maintainer also encourages you to add your own scheme, if, somehow, it’s been missed on this site.  Or, to add to any of the existing pages if you have something to contribute.

So there you have it!  All the endless naming possibilities for your home networking project this weekend!
Y’all have fun!

1/1/2013

Year in Review

Filed under: Fun Work,Geek Work,News and Current Events,The Network Geek at Home — Posted by the Network Geek during the Hour of the Sheep which is mid-afternoon or 3:16 pm for you boring, normal people.
The moon is Waning Gibbous

No, not a long, melancholy post reviewing the past year’s emotional highs and lows.
Just a link to an autogenerated infographic summing up this blog’s traffic for 2012.
Enjoy!

11/30/2012

PriorityDigital Free Utilities

Filed under: Geek Work,Red Herrings,The Network Geek at Home — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:50 am for you boring, normal people.
The moon is Waning Gibbous

I don’t know about you, but I love free stuff.

I do a lot of stuff on the web every day.  Yeah, I know you can’t tell that from how neglected this blog is these days, especially compared to the old days when I was posting pretty much every day, but, trust me, I’m always buzzing around the web doing something.  Sometimes, it’s building websites like this one.  Not very pretty, but pretty functional and sometimes, not even sites for me.  When I build a site, I generally leave it to the owners to come up with the actual content and just help them get the framework setup, including all the legalese that seems to be pretty much de rigueur these days.
Well, now, thanks to PriorityDigital.com, I think I have a slightly better solution.  They have a page of free utilities that include a Privacy Policy Builder, a Disclaimer Builder and a Non-Disclosure Agreement Maker, among others.  So now, you, or I, can go to these utilities and fill in a few relevant details and quickly get a fairly generic, but still useful, privacy policy, general website disclaimer or non-disclosure agreement without having to pay a lawyer!  Granted, they are pretty generic, but, still, for most of us, they’ll handily take care of our needs.

So, okay, yeah, kind of lame for a Friday, but, still it might give you a little something extra for your side project this weekend.
Enjoy!

10/5/2012

Factory Reset

Filed under: Fun Work,Geek Work,Red Herrings — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:22 am for you boring, normal people.
The moon is Waning Gibbous

Have you ever wanted a “do over”?

Remember when we were kids and we’d be out playing and something crazy would happen that totally messed up someone’s game?  We’d more often than not give them a “do over”.  We’d let them reset and try again.  Wouldn’t that be nice to have in every aspect of life?
Well, speaking as a professional network geek, sometimes there is, at least on some network equipment.  We call it a “factory refresh” or, as the title of this post implies, a “factory reset”.  Basically, for  you non-techs, the idea is that sometimes a configuration gets so wrong, so borked, so bad that it’s easier to just reset a device back to how it shipped from the factory and start the configuration process over again from scratch.  I cannot tell you how often I’ve been happy to have this feature and be able to use it.

Of course, sometimes, we inherit these borked devices.  Or we foolishly throw out the two-page manual that tells us how to reset the thing.  Then, we have to go searching for the information on how to reset whatever it is we’re trying desperately to get configured before the weekend, so we don’t have to stay late, again, on a Friday.
Well, wouldn’t it be nice if that was all in one place?  Well, now it is, mostly.  There’s a handy site/wiki called Factory Reset that has most, if not all, of the reset instructions for the most popular and common computer appliances out there.  They’ve got everything from routers to switches to network-attached storage.

So, if you’re wrestling with some device that has gotten out of control, again, why not pop over there and find out how to reset it so you can get out of the office and enjoy your weekend?

7/27/2012

Steal a BMW in 3 Minutes

Filed under: Criticism, Marginalia, and Notes,Fun,Geek Work,News and Current Events — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:27 am for you boring, normal people.
The moon is Waning Gibbous

No, I’m not advocating that you actually do this!

But, in Europe, it’s already been done.
Apparently, the special key that costs you $160 for your super-secure BMW isn’t really all that much of a deterrent after all.  According to a story that ran recently on ExtremeTech, hacker-thieves have found a way to bypass the BMW security system and, in a separate step, decode the information needed to actually start the car without having the special, expensive key.  It seems that the on-board diagnostic port on the cars gives them complete, unsecured access to the data in the car’s computer, which allows them to get the codes they need to program up a new key and drive away in your very high-end car.  Interestingly enough, they’re able to do this because BMW is required by law to keep the codes and on-board diagnostic information unencrypted to allow competing firms to service the vehicles and not get locked out by BMW to form a monopoly.
Although the article focuses on BMWs, likely this is happening to other cars that use a similar technology and for the same reasons.  It’s just that right now, the expensive, high-end BMWs are what the thieves are stealing, and in fact they’ve always been popular targets for thieves due to their general popularity, so they’re getting all the attention.

Frankly, when I first heard about these “special” keys and ignition systems, I wondered how long it would be before they were subverted.  I just generally distrust systems like that, which operate over easily accessible networks.  Too many points of failure.  Anyway, check out the video in the link.  It’s pretty scary how quickly they can accomplish their goal of stealing the car.
But, what an amazing, real-world test of that security system!

So, how is this “fun” for a Fun Friday link?
Okay, it’s not really, but it seemed appropriate to share while I was out at DEF*CON in Las Vegas.  But, all you criminal types, don’t get any ideas!  My house is being watched and I’ll be back by the time that most of you read this!

3/7/2012

Security and QR Codes

Filed under: Criticism, Marginalia, and Notes,Geek Work,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:53 am for you boring, normal people.
The moon is Waning Gibbous

Do you trust everything you see?

We’ve all seen QR codes, even if we may not have all recognized what they are.  These little, square dot patterns are everywhere these days, especially in advertising.  In fact, some people have gotten so used to scanning them with their smart phones to get more information about products and services that hackers are now exploiting them.  I recently read a very interesting article on TechRepublic by Michael Kassner titled Beware of QR Codes about an exploit found in the wild, and QR code exploits in general.  The problem is, we tend to trust them, mainly, I think, because they’re too new for us to have been burned bad by them yet, and they are popping up everywhere!  Pay attention as you go through your day and see how many of these little deals you bump into.  They’re in everything from magazine ads to product labels to posters to coupons!  Even Doonesbury has run a strip with a QR code in it!

So, as you swim out there, awash in the ocean of marketing and sales that we live in, pay attention to those who might subvert your complacency.  If it’s easy for you to use, it’s probably easy for someone to abuse, just like the QR code seems to be!

2/29/2012

On-Line Dating Security

Filed under: Advice from your Uncle Jim,Bavarian Death Cake of Love,Geek Work,News and Current Events — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 12:39 pm for you boring, normal people.
The moon is Waning Gibbous

I’m pretty sure I was propositioned by a prostitute on Match.com this morning.

I could be wrong, of course, but when a 27-year-old woman who’s profile says she’s “almost divorced” and looking for people in the age range between 35 and 37 sends an email to a 43-year-old man (ie. me) asking if he’s interested in a “one-nighter”, it seems suspicious to me.  Maybe I’m just cynical.
She started off sending me a short note that was a little vague, but at least sounded like she might have possibly read my profile.  Well, except for the part where I was 43.  But, most people I bump into out in the world aren’t very detail oriented, so I gave her the benefit of the doubt and  suggested that I might be a little old for her.  I went on to explain that I wasn’t comfortable dating someone who hadn’t started school yet when I would have graduated from college.  What I didn’t say was that it would make me feel like a pervert to dating someone potentially young enough to be my daughter, but, that’s what I was trying to get at, in a polite way.  Then I wished her good luck in her search and went on my merry way.
This morning, I got a note back asking if I was interested in a “one-nighter”.  And, then she gave me an e-mail address at Hotmail.com.  That raised two, giant red flags for me.  First of all, while I am a wizard in the sack, there’s nothing about my Match.com profile that would indicate that to the casual observer.  And, frankly, while many women find me absolutely adorable, I think that’s more based on my personality and sense of humor than my rugged good looks.  It’s been years since I was pretty.
So, sure, maybe she’s just a messed up kid trying to work out her “daddy issues” and not a hooker, but I suspect that she’s looking for an entirely different kind of “daddy”.  Either way, I don’t need that particular flavor of drama at this point in my life.  Seriously.

But, oddly enough, earlier in the week, I was reading a security blog at TechRepublic by Michael Kassner.  The entry was titled “Online Dating Services Risking More Than a Broken Heart” and was all about the potential security issues related to on-line dating.  Now, I work in the industry and I maintain pretty decent security, even at home, but I know not everyone is quite as paranoid as I am.  And, that’s just within the IT industry!  I cannot imagine the wild and wooly dangers faced by people foolish enough, or desperate enough, to contact someone who seems to good to be true through their own, personal e-mail address!  Not to mention how much data you put up on a profile that may be active indefinitely on a dating site.
So, go read his article and think about what you put out there, where you put it and who might be reading it.

Oh, and one last bit of dating advice from your Uncle Jim, if she seems too good to be true, she probably is!


Advice from your Uncle Jim:
"When I look into the future, it's so bright it burns my eyes."
   --Oprah Winfrey

2/7/2012

DNS Attacks Are On The Rise

Filed under: Geek Work,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Snake which is just before lunchtime or 11:14 am for you boring, normal people.
The moon is Waning Gibbous

DNS has inherent weakness.

In it’s current form the Domain Name System, by it’s open nature, is pretty primed for exploitation.
Some of these attacks are more obvious than others, but there are two that I find particularly troubling.  More so that I can see them being used together to really mess with a website owner.
The first of these two attacks isn’t new.  But, the fact that it isn’t new and has been dealt with before doesn’t mean that it has suddenly stopped being effective.  The attack is called “DNS poisoning” and it works by corrupting the DNS cache on a server, which then forwards those poisoned DNS records as legitimate to other, unsuspecting servers.  The end result is that the attackers can redirect traffic from a legitimate website to their own site.  It’s hard to flat out stop right now, though, once discovered, it can be fixed with relatively little trouble.  This attack was used recently against several websites who were supporting SOPA and PIPA.  Of course, since these folks were trying to make a statement, it was pretty clear what had happened, so techs were working to fix it pretty quickly.
The second attack, which I would think include the first attack at its initial stages, is sub-domain hijacking.  In this attack, the attackers redirect the sub-domain of an existing site to another location.  This is a little more subtle and hard to detect.  In this case, the attackers are looking to profit from a well-established domain by “piggy-backing” on their reputation.  They poison the DNS records to point something like Viagra.google.com to their actual website, selling Viagra, or a site filled with spammy links that redirect a potential victim to their website selling Viagra, or whatever.   This attack takes a proactive system administrator to catch.  Since it doesn’t redirect any of the main, honest, actual site anywhere, but only uses its reputation to improve their own spammy links, it’s not always obvious that it’s going on.  Regular DNS record audits are about the only way to catch this, barring an angry end-user contacting the main site.

The internet is still a wild and wooly place sometimes, folks.  The reasons the professionals get paid what they do is because, theoretically, they have to deal with all that stuff and keep us safe!  Which reminds me, I have to go check my own company’s websites and DNS records, not to mention my own!
(The title, incidentally, was inspired by the movie that helped get me into this business, Sneakers. “Cattle mutilations are up.“)

1/31/2012

Essential Tools for System Admins

Filed under: Geek Work,GUI Center,MicroSoft,Review — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:09 am for you boring, normal people.
The moon is Waning Gibbous

There are more free sysadmin tools for Windows than you can shake a memory stick at these days.

But, here are a few of the better collections of them.
First, from Infoworld, 15 “Essential” Open Source Tools for Windows Admins.  I’m not sure I’d say these are all essential, but they are a pretty good start.  I can only vouch for three of them on this list; Wireshark, Nmap, and ClamWin Antivirus.  Though I’m familiar with them from the Linux/Unix world, these are the Windows equivalents and they work just fine.  Old network geeks will recognize Wireshark and Nmap as a reliable packet sniffer and a security vulnerability scan tool, respectively.  You may not be as familiar with ClamWin.  It’s based on the ClamAV engine, which in its Linux boot-disk incarnation, has saved my bacon more than once!  There are a couple inventory tools in this list I plan on looking more closely at, not to mention the add-on for Nmap they talk about.  Good stuff and worth checking out!

Secondly, from TechRepublic, there’s Five Free Windows Registry Cleaners.  Again, I’ve only used two of these five; CCleaner and Wise Registry Cleaner.  CCleaner does everything I generally need in regards to shoring up old, creaky registries, but I’m always looking for new tools.  The version of Wise Registry Cleaner I used was an older one, but it worked well enough.  And, it does have the nice feature of being able to backup and restore older versions of your registry.  Believe me, that can come in handy sometimes!

Thirdly, also from TechRepublic, Five Microsoft Tools to help with Server Management.  Of these five, again, I’ve only used one; dcdiag.  Naturally, it’s the only command-line tool in the bunch.  Though, I hear Microsoft has been talking about going back to a command-line, terminal interface for their server products.  I’m a little leary of any security utility that is based on a wizard, but I have to admit, at least it’s something that might encourage Windows sysadmins to do some work at securing their servers more.  And, I have to admit, I wish I had known more about the file server migration wizard a few years ago.  It sure would have helped me more than once!

And, finally, the venerable, but ultimately useful, More Sysinternals for Windows Admins.  Now, these I’ve used quite a bit!  At least, some of them.  All the disk usage utilities have been super helpful over the years in determining who has been sucking up all the drive space on my servers!  And I’ve used PsInfo to attempt to gather information in various attempts to inventory my various networks.  And, these days, everyone will need the RootKitRevealer sooner or later.  Sadly, almost everyone has been, or will be, effected by a rootkit virus of some kind.  It seems inevitable.

So, there you go, system administrators.  There’s my gift to you in the form of links to tools to do your jobs, faster, easier and more efficiently.  Enjoy!

1/6/2012

Free Installers

Filed under: Fun Work,Geek Work,Linux,MicroSoft — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:08 am for you boring, normal people.
The moon is Waning Gibbous

Let’s start the year slow.

So, I’m sure a lot of you got new PCs or laptops, or upgraded your old ones, this holiday season.  Maybe it was a Christmas gift.  Maybe a Christmas gift to yourself.  Maybe you just took advantage of the post-holiday sales.  Whatever it was or how ever you got it, you probably are feeling the pain of reinstalling all those “essential” programs that you use on a regular basis.  Things like Firefox and Mozilla or Chrome and Skype or Winamp or Flash or .Net or iTunes or LibreOffice or any number of similar little things.  You’ll be feeling the pain of having to go to all those individual websites to collect the various install files to run.

Well, I have the solution to the problem you didn’t realize you had.  It’s a little site called “Ninite” and they call themselves “…the fastest way to install, reinstall or upgrade free software”.
You go to the site, check the different bits of software and click the “Get Installer” button and the site will serve up a downloadable installer file that will install the free software you checked on the form.  You run the file and your software gets installed.  That simple.  Oh, and the basic service itself is free.
Now, if you want to maintain that free software and keep it updated, they have a very reasonable service for that, too.  For the personal edition for a single computer, it’s just $9.99 a year, at the moment, but, of course, that may change.

Both the free and pay services are available for Windows or Linux, which I think is pretty damn extra cool.

Anyway, there’s your first fun/cool/useful link for the new year.  I think it bridges the fun, the free and the very geeky stuff that this blog is, I hope, known and appreciated for sharing.
Happy New Year everyone!

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.